Information Security Governance Simplified From the Boardroom to the Keyboard

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to buil...

Full description

Saved in:
Bibliographic Details
Main Author: Fitzgerald, Todd (auth)
Other Authors: Peltier, Tom (auth)
Format: Electronic Book Chapter
Language:English
Published: Taylor & Francis 2011
Subjects:
Online Access:OAPEN Library: download the publication
OAPEN Library: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 oapen_2024_20_500_12657_41772
005 20200723
003 oapen
006 m o d
007 cr|mn|---annan
008 20200723s2011 xx |||||o ||| 0|eng d
020 |a b11357 
040 |a oapen  |c oapen 
024 7 |a 10.1201/b11357  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a KCC  |2 bicssc 
072 7 |a UB  |2 bicssc 
072 7 |a UR  |2 bicssc 
100 1 |a Fitzgerald, Todd  |4 auth 
700 1 |a Fitzgerald, Todd  |4 auth 
700 1 |a Peltier, Tom  |4 auth 
245 1 0 |a Information Security Governance Simplified  |b From the Boardroom to the Keyboard 
260 |b Taylor & Francis  |c 2011 
300 |a 1 electronic resource (433 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc-nd/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ 
546 |a English 
650 7 |a Microeconomics  |2 bicssc 
650 7 |a Information technology: general issues  |2 bicssc 
650 7 |a Computer security  |2 bicssc 
653 |a IT Security 
653 |a Management of IT 
653 |a Security Services 
653 |a BUSINESS/MANAGEMENT 
653 |a InfoSECURITY 
653 |a SCI-TECH 
653 |a ITECH 
653 |a INFORMATIONSCIENCE 
653 |a STM 
653 |a card 
653 |a controls 
653 |a data 
653 |a department 
653 |a identity 
653 |a industry 
653 |a management 
653 |a payment 
653 |a program 
653 |a system 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/id/3aca703e-7f5a-4be3-8668-ebf5a5529d56/9781439811634.pdf  |7 0  |z OAPEN Library: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/handle/20.500.12657/41772  |7 0  |z OAPEN Library: description of the publication